Skip to Main Content

Beware of the scammers: Penetration Testing

Online articles



A Method for Automatic Penetration Testing and Mitigation: A Red Hat Approach

In this context the Red Hat hackers, defined as vigilantes of the hacker world, are emerging. Their main aim is to independently found and solve vulnerabilities, by preventing cyberattacks. In this paper we propose a method aimed to automatise the vulnerability discover and mitigation process typically performed by Red Hat hackers.

sciencedirect.net 

eBooks

Videos


What is Penetration Testing by Hitachi Systems Security

Introduction to penetration testing



What is a Vulnerability Assessment? by Hitachi Systems Security

Definition of vulnerability assessment.



Ethical Hacking and Penetration Testing by MrBrownCS

Talking about how ethical hackers (white-hat & grey-hat) can be used by organisations to find weaknesses in their own security. The process of penetration testing is explained, as are the use of activity logs to find other weaknesses.

Infographic

Pratum (2022 Mar 2016)Penetration Testing Explained [Infographic].